Hi Hannes,
Am 02.03.2015 um 16:31 schrieb Hannes Tschofenig:
Hi all,
I am trying to finalize my work on the shepherd write-up of
draft-ietf-oauth-spop.
Unfortunately, there are still some outstanding issues:
1. S256 as a mandatory-to-implement code challenge method
(by the Authorization Server)
Currently, S256 is MTI but implementations do not use S256 (yet).
Hence, we have very few (maybe not even a single) implementation
that is in conformance with the specification at the moment.
Does the group see a problem with this choice of MTI
(or lack of conformance)?
As already indicated on the list: The original reason to invent spop was
to prevent malicous apps, which intercepted the redirect back to the
legitimate app and that way impersonated the user (see section 1). In my
opinion, "plain" fullfils this goal. I therefore don't see a need (or
justification) to make S256 MTI.
The security considerations sections says:
"If the "plain" method is used,
there is a chance that it will be observed by the attacker on the
device."
Under which circumstances is an attacker supposed to observe the
challenge on the device? And if the attacker is able to observe the URLs
in an embedded or the system browser, isn't this attacker most likely
capable of observing password input in the same browser? In this case,
we should rather be concerned regarding the user's password then
anything else.
kind regards,
Torsten.
2. Naveen Agarwal has not provided his confirmation that any and
all appropriate IPR disclosures required for full conformance
with the provisions of BCP 78 and BCP 79 have already been filed.
Without his confirmation I cannot finalize my shepherd write-up.
3. Normative language regarding code verifier randomness
We had a discussion about the language used to describe what
implementations need to provide in terms of randomness of the
code verifier. Here is the discussion thread:
http://www.ietf.org/mail-archive/web/oauth/current/msg14217.html
Ultimately, the issue boiled down to the following sentence and
the use of 'MUST' vs. 'SHOULD':
"the code verifier SHOULD have enough entropy to make it
impractical to guess the value"
It would be good to know whether the group objects using MUST
instead of SHOULD to enhance security.
Ciao
Hannes
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth